Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
T
tor
Manage
Activity
Members
Labels
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
The Tor Project
Core
debian
tor
Commits
397f7c87
Commit
397f7c87
authored
15 years ago
by
Roger Dingledine
Browse files
Options
Downloads
Patches
Plain Diff
fix some typos in our spec files
parent
184e7aa7
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
doc/spec/dir-spec.txt
+2
-2
2 additions, 2 deletions
doc/spec/dir-spec.txt
doc/spec/tor-spec.txt
+10
-10
10 additions, 10 deletions
doc/spec/tor-spec.txt
with
12 additions
and
12 deletions
doc/spec/dir-spec.txt
+
2
−
2
View file @
397f7c87
...
...
@@ -1285,7 +1285,7 @@
selection.
Additionally, the Measured= keyword is present in votes by
participating bandwidth measurement authorites to indicate
participating bandwidth measurement authorit
i
es to indicate
a measured bandwidth currently produced by measuring stream
capacities.
...
...
@@ -1436,7 +1436,7 @@
by multiplying the previous published consensus bandwidth by the
ratio of the measured average node stream capacity to the network
average. If 3 or more authorities provide a Measured= keyword for
a router, the authorites produce a consensus containing a "w"
a router, the authorit
i
es produce a consensus containing a "w"
Bandwidth= keyword equal to the median of the Measured= votes.
The ports listed in a "p" line should be taken as those ports for
...
...
This diff is collapsed.
Click to expand it.
doc/spec/tor-spec.txt
+
10
−
10
View file @
397f7c87
...
...
@@ -20,7 +20,7 @@ see tor-design.pdf.
PK -- a public key.
SK -- a private key.
K -- a key for a symmetric c
y
pher.
K -- a key for a symmetric c
i
pher.
a|b -- concatenation of 'a' and 'b'.
...
...
@@ -171,8 +171,8 @@ see tor-design.pdf.
In "renegotiation", the connection initiator sends no certificates, and
the responder sends a single connection certificate. Once the TLS
handshake is complete, the initiator renegotiates the handshake, with each
part
ies
sending a two-certificate chain as in "certificates up-front".
The initiator's ClientHello MUST include at least on
c
e ciphersuite not in
part
y
sending a two-certificate chain as in "certificates up-front".
The initiator's ClientHello MUST include at least one ciphersuite not in
the list above. The responder SHOULD NOT select any ciphersuite besides
those in the list above.
[The above "should not" is because some of the ciphers that
...
...
@@ -200,9 +200,9 @@ see tor-design.pdf.
to decide which to use.
In all of the above handshake variants, certificates sent in the clear
SHOULD NOT include any strings to identify the host as a Tor server.
In
the "renegotation" and "backwards-compatible renegotiation", the
initiator SHOULD chose a list of ciphersuites and TLS extensions
chosen
SHOULD NOT include any strings to identify the host as a Tor server. In
the "renegot
i
ation" and "backwards-compatible renegotiation"
steps
, the
initiator SHOULD cho
o
se a list of ciphersuites and TLS extensions
to mimic one used by a popular web browser.
Responders MUST NOT select any TLS ciphersuite that lacks ephemeral keys,
...
...
@@ -288,7 +288,7 @@ see tor-design.pdf.
6 -- CREATED_FAST (Circuit created, no PK) (See Sec 5.1)
7 -- VERSIONS (Negotiate proto version) (See Sec 4)
8 -- NETINFO (Time and address info) (See Sec 4)
9 -- RELAY_EARLY (End-to-end data; limited)
(See
s
ec 5.6)
9 -- RELAY_EARLY (End-to-end data; limited)(See
S
ec 5.6)
The interpretation of 'Payload' depends on the type of the cell.
PADDING: Payload is unused.
...
...
@@ -356,7 +356,7 @@ see tor-design.pdf.
The address format is a type/length/value sequence as given in section
6.4 below. The timestamp is a big-endian unsigned integer number of
seconds since the
u
nix epoch.
seconds since the
U
nix epoch.
Implementations MAY use the timestamp value to help decide if their
clocks are skewed. Initiators MAY use "other OR's address" to help
...
...
@@ -398,7 +398,7 @@ see tor-design.pdf.
Onion skin [DH_LEN+KEY_LEN+PK_PAD_LEN bytes]
Identity fingerprint [HASH_LEN bytes]
The port and address field denote the IP
V
4 address and port of the next
The port and address field denote the IP
v
4 address and port of the next
onion router in the circuit; the public key hash is the hash of the PKCS#1
ASN1 encoding of the next onion router's identity (signing) key. (See 0.3
above.) Including this hash allows the extending OR verify that it is
...
...
@@ -885,7 +885,7 @@ see tor-design.pdf.
6.4. Remote hostname lookup
To find the address associated with a hostname, the OP sends a
RELAY_RESOLVE cell containing the hostname to be resolved with a
nul
RELAY_RESOLVE cell containing the hostname to be resolved with a
NUL
terminating byte. (For a reverse lookup, the OP sends a RELAY_RESOLVE
cell containing an in-addr.arpa address.) The OR replies with a
RELAY_RESOLVED cell containing a status byte, and any number of
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment